Summary: | <x11-libs/pango-1.24.2 Integer overflow (CVE-2009-{1194,2468}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | axiator, gnome, jaak |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.ocert.org/advisories/ocert-2009-001.html | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
2009-05-07 20:49:12 UTC
Gnome, can we go stable with 1.24.1? CVE-2009-1194 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1194): Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox. gnome, can we go stable with pango 1.24.1 or do you plan to backport the patch? http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e [21:13] <Ford_Prefect> rbu, go for it. GNOME herd, please do not kill me. Arches, please test and mark stable: =x11-libs/pango-1.24.2 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" amd64/x86 stable Stable for HPPA. ppc64 done ppc done alpha/arm/ia64/s390/sh/sparc stable All arches done, GLSA request filed. CVE-2009-2468 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2468): Integer overflow in CoreGraphics in Apple Mac OS X, as used in Mozilla Firefox before 3.0.12, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long text run that triggers a heap-based buffer overflow during font glyph rendering, a related issue to CVE-2009-1194. There is no <x11-libs/pango-1.24.5-r1 in portage any more. This issue was resolved and addressed in GLSA 201405-13 at http://security.gentoo.org/glsa/glsa-201405-13.xml by GLSA coordinator Sean Amoss (ackle). |